Course: Computer Viruses and Security

« Back
Course title Computer Viruses and Security
Course code AUIUI/AE7PV
Organizational form of instruction Lecture + Lesson
Level of course Master
Year of study not specified
Semester Winter
Number of ECTS credits 4
Language of instruction Czech, English
Status of course unspecified
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Course availability The course is available to visiting students
Lecturer(s)
  • Kincl Jan, Ing.
  • Korbel Jiří, Ing. Ph.D.
  • Králík Lukáš, Ing. Ph.D.
  • Malaník David, Ing. Ph.D.
Course content
Topics: 1. Artificial intelligence and artificial life, self-replicating structures (game of life, Fredkin's self-replicating structures). Artificial life and virtual universe (Tierra, biomorphs, SBEAT, SBART, EDEN, SWIMBOOT). Artificial life and complex systems. 2. Self-replicating structures, finite automata and Turing machines. Virus definition, common and different features with biological virus. Classification of malicious code (viruses, adware, spyware, worms,) and its spread of code. HOAX. 3. Malicious code and its dependence on the runtime environment. 4. Methods of infection. File infections (com, exe, API, MBR, DBR), infection techniques (transcribing viruses, joining viruses, cavity viruses, secret point). Memory infections, interrupt usage, swap viruses. 5. Basic defense strategies of viruses. In-memory scanning, tracing, debug protection, armored viruses, retroviruses, defense against heuristic analysis, emulation and disassembly, use of undocumented functions. 6. Creation and generation of viruses. Virus code, encoded viruses (decryptors, nonlinear decoding, W95 / phono, W95 / Mad2736), oligomorphic viruses, polymorphic viruses, metamorphic viruses. Virus generators. 7. Repetition of basics of computer networks. Eavesdropping on the network. Web server security. Port scanning. 8. Computer networks and attacks on them. Network research, autonomous systems, network services. Wireless networks and attacks. Firewall. 9. Google Hacking. Buffer overflow - stack overflow. Security of MS Windows accounts. 10. Spam and antispam. Spam, definitions and history. Spam protection tools. Antispam strategies and tools for Windows and Linux. Bayesian classifier and SpamAssassin. Mail client and filters. 11. Phishing. Phishing as a subcategory of spam. False identity, redirection and false identity. Phishing and Malware. Cracking. Program protection. Anti-debugging and anti-disassembly programs. Program protection. 12. Hacking I. Collection of information, scanning and overview of scanning programs, network services and their research. Operating systems and attacks on them: Mac OSX, Windows and Linux. 13. Code attacks, web attacks. Incident prevention. Implementation of security policy and procedures. Search procedures and computer investigation. Data tracing and network surveillance. 14. Web attacks, hacker tools. Computer viruses, antiviruses and artificial intelligence

Learning activities and teaching methods
Lecturing, Demonstration, Exercises on PC, E-learning
  • Home preparation for classes - 30 hours per semester
prerequisite
Knowledge
Knowledge of MS Windows and Linux operating systems. Basic knowledge of the function of LAN / WAN networks.
Knowledge of MS Windows and Linux operating systems. Basic knowledge of the function of LAN / WAN networks.
learning outcomes
Basic orientation in the field of Cybersecurity
Basic orientation in the field of Cybersecurity
He will explain the current threats in cyberspace.
He will explain the current threats in cyberspace.
Evaluate the security of the server.
Evaluate the security of the server.
Evaluate desktop security.
Evaluate desktop security.
Use tools to identify vulnerabilities in the infrastructure.
Use tools to identify vulnerabilities in the infrastructure.
Designs a penetration test of the infrastructure.
Designs a penetration test of the infrastructure.
Skills
Conduct an infrastructure penetration test.
Conduct an infrastructure penetration test.
Verifies the security of the server or web application.
Verifies the security of the server or web application.
Recognizes the types of attacks in cyberspace.
Recognizes the types of attacks in cyberspace.
teaching methods
Knowledge
Exercises on PC
Lecturing
Lecturing
Exercises on PC
Demonstration
Demonstration
E-learning
E-learning
assessment methods
Written examination
Written examination
Analysis of seminar paper
Analysis of seminar paper
Recommended literature
  • Jan Kolouch. CyberCrime. Praha, 2016. ISBN 9788088168157.
  • Jan Kolouch. CyberSecurity. Praha, 2019. ISBN 978-80-88168-34-8.
  • Jon Erickson. Hacking: umění exploitace. Brno, 2009. ISBN 978-80-7413-022-9.
  • Misha Glenny. Temný trh: kyberzloději, kyberpolicisté a vy. Brno. ISBN 9788073635220.
  • Peter Szor. Počítačové viry: analýza útoku a obrana.. 2006. ISBN 8086815048.
  • Petr Szor. Art of Computer Virus Research and Defense. Symantec Press, 2005. ISBN 0321304543.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester